Vulnerabilities
Vulnerable Software
Perfood:  >> Couchauth  Security Vulnerabilities
Session tokens and passwords in couch-auth 0.21.2 are stored in JavaScript objects and remain in memory without explicit clearing in src/user.ts lines 700-707. This creates a window of opportunity for sensitive data extraction through memory dumps, debugging tools, or other memory access techniques, potentially leading to session hijacking.
CVSS Score
6.5
EPSS Score
0.0
Published
2025-11-20
A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions <= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.
CVSS Score
9.6
EPSS Score
0.001
Published
2024-01-03


Contact Us

Shodan ® - All rights reserved